Privacy and Processes

Size: px
Start display at page:

Download "Privacy and Processes"

Transcription

1 1 Privacy and Processes Ciarán Bryce PRIAM Saint Malo May Definition of a Process 2! A general method of doing something, involving steps or operations which are usually ordered and/or interdependent.! E.g., in manufacturing, organizations, software development, etc.! A business process is a set of linked activities that create value by transforming an input into a more valuable output. Both input and output can be artifacts and/or information and the transformation can be performed by human actors, machines, or both.

2 Why Processes are Important 3! Information system is subject to technical, organizational and legal constraints! Organizational! Applying patches and measuring effectiveness of patches,! Analyzing user behavior for application preferences and evolution of system! Ensuring people who need documents have access! Legal! Document archival for Sarbanes Oxley! Digital Restrictions Management (e.g., for software licensing)! Personal Data protection Why Processes are Important 4! Technical solutions have less and less significance! E.g., Most effective anti-virus is coherent and rigorous patching policy! Information system is an organizational bottleneck! To be agile, need to abstract IT to match roles and objectives of organization! IT Challenge is integration! Companies need architects, not programmers! Written formal description of process permits! Comparison, optimisation and analysis (e.g., for business continuity, etc.)! Foundation for execution

3 Processes versus Applications 5 Application Process Defined as Actors involved Role in organization Reliability/Availability Security Efficiency Code base Programmer, user Asset Fault Tolerance (software and hardware faults) Cryptography, access control, etc. CPU cycles, memory space, etc. Set of activities working towards precise goal Programmer, manager, operator, certifier, client, user, etc. Expresses business or organizational model Business Continuity (Bird flu, computer failure, stock market crash) Employee screening, key management, SOX compliance, etc. Man-hours, cost, sales, business intelligence. Processes in PRIAM 6! CNIL and Garante directives! Implementing them and verifying them! In functional model, the auditor is a role!! Who is permitted this role? What are associated rights? etc.! Knowledge Management is a process issue! Someone has to define ontologies - and someone has to define who that someone is! TPM management is a process issue! Roles of privacy CA need to managed: security depends on this! Software provider of functional model layer is a principal!

4 7 Example of Motivation for Process Support and challenges The EDOS Project - improving the quality of an open source distribution. Background 8! Linux is not a product. Rather, Linux is a collection of software components, individually crafted by thousands of independent hands around the world, with each component changing and evolving on its own independent Ian Murdock, timetable. creator. Linux of the is Debian not a product. projecit is a process. Ian Murdock, founder of the Debian project.! The more F/OSS users, the better!. In principle.

5 Background 9! Building a distribution involves! Producing and Collecting software! Configuring/compiling with respect to the dependencies! Quality Assurance (Testing)! Distributing to clients : boxes and download! These activities are currently tackled separately! List is not exhaustive, e.g.,! Training of developers! Scouting for clients!.! All part of the F/OSS process 10 F/OSS Environment Defects Management Production Management Version Dependency Management Community Platform Package Distribution Distribution Management Bug Test Projects Management Role ConfigurationMetric Documentation Release Tests Management Process Feedback Roles Management Application Project Activity Management Need for a transversal view of whole F/OSS process

6 F/OSS Process 11! Process! A community of actors who consume and produce resources! A multitude of activities and tools! A number of roles for activity organisation! Lack of activity coordination and performance metering leads to process inefficiency! Structured process management leads to improvement, e.g. in F/OSS,! Ontology activity that defines and binds attributes to actors and resources for more flexible lookup, e.g.,! Find package that has been tested on Mandrivalinux 10.1 with Ethernet card enabled! Find developer with experience in cryptography and Java programming! Find someone willing to act as a secondary server administrator Process Reference Model (version 1) 12! Represents the main data types used in a F/OSS process! Represents content and community in a uniform manner! Models management of any activity in the F/OSS Process! Models evolution of projects, i.e., addition and integration of new activities! The PRM provides a model of F/OSS artefacts and activities that manage these artefacts! Current format of PRM: formal model and Java API

7 PRM Model 13! The Information model binds meta-data (attributes) to artefacts! Used to lookup artefacts! E.g., find Java packages with RSA implementations! Lookup takes attribute Boolean algebra expressions! E.g., find Java cryptography packages from official mirror servers or trusted peers! Substitutability! Best match semantics in look-up! The model also defines primitives to create and lookup artifacts based on attributes! These enable F/OSS activities to be coordinated! E.g., pipeline all reported errors on package to competent developer! Lookup blocks until create of artefact with matching attributes Examples of Attributes 14 Actor Unit of Content Contact Information Knowledge Competences Interests License Version Type Target architecture Dependencies Conflicts Et cetera! Actors and content are equally important to process! Code and documentation are equally important

8 PRM Elements 15 PRM Elements Artifact Project Actor Activity Integrity Rule Right Event Process Role Task Metric Log! Core PRM Elements represent the minimal set of Artifacts for handling! Community, Projects, Resources, Responsibilities, Measurement, Etc.! Artifacts! Managed by PRM activities! Located via attributes Core PRM Activities 16 PRM Activities Artifact Artifact Management Project Project Management Actor Community Management Activity Activities Management Integrity Rule Rights Management Right Event Management Event Process Management Process Role Management Role Task Management Task Metrics Management Metric Logs Management Log Evolution? = New Activity! An activity defines a set of operations that manage artifacts and integrity rules! e.g., No version exists between old and new version for code artifacts

9 PRM Activity Interaction 17! Challenge in implementing processes is handling legacy code! Applications and Activity implementations have to communicate through the interfaces provided by the Activities Application Activity 1 Activity 2 Activity 3 PRM Model Interaction with PRM Elements Implementation 1 Implementation 2 Implementation 3 Examples of PRM Operations 18! Artifact Management! registerartifacttype(type Directory, Valuation Directory, P IR, Project):Type! newartifact(type, Value Directory, Project):! lookup(directory, Project):PArtifact! exists(artifact):boolean! substitutable(artifact, Artifact):Boolean! Activity Management! declareactivity(name, P(lambda, P IR)):Activity! associateactivity(activity, Project):void! lookup(directory):partifact! exists(activity):boolean! isassociated(activity, Project):Boolean

10 Metrics handling 19! Fundamental goal of process infrastructure is to measure and meter activities! Individual activities can have metrics (e.g., number of bug reports per package)! Or are bound to specific implementation tools! Challenge is to convert metrics to KPIs! Useful KPIs in PRIAM! Number of reported privacy violations! Relation of number of auditors to claimed violations! Relation of TPM use to reported violations! Ease of integration of functional architecture Handling metrics through the PRM 20! Creation! new Metric(description, viewpoint, metric set[], occurrence, execution)! Lookup! find(directory) -> Metric[]! Evaluation! evaluate(project, Metric) -> value! Observation! observe(project, Metric, Value) -> wait for event (metric value reached)

11 21 Current Work on the PRM Ciaran Bryce (INRIA) Olivier Abdoun (INRIA) Chrislain Razafimahefa (Shared Object) Stéphane Laurière (Mandriva) Michel Pawlak (University of Geneva) Current Work 22! Separate core process support from F/OSS support! Development of process language and (JavaCC) compiler! SOA/BPM Project! Mapping PRM to SOA infrastructure! Qualipso! Refining OSS part of PRM! Code, code, code! Aiming for release in July (Apache 2 License)

12 23 24 Architectural Overview OSS Forge TPM Identity Management PRIAM on Functional Model BP PRM Default PRM Implementation Knowledge Management Software Evolution Legacy systems (SOA, ) Apache Licence 2, except for BP parts

13 Abstract Architecture Corporate Legal 25 User and Service layer Activities Content Community Policy Kernel Layer Community Management Content Management Ontology Management Activity Management License Management Software Management Virtual Machine Native OS (e.g., Linux) Architectural Layer

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform

More information

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.

More information

Chapter 9 Software Evolution

Chapter 9 Software Evolution Chapter 9 Software Evolution Summary 1 Topics covered Evolution processes Change processes for software systems Program evolution dynamics Understanding software evolution Software maintenance Making changes

More information

Foreword. Contents. Edos - Sixth Framework Programme - Priority 2 1

Foreword. Contents. Edos - Sixth Framework Programme - Priority 2 1 Edos Glossary Project Title Edos Project Number IST-004312 Contact Authors Ciarán Bryce, Michel Deriaz, Michel Pawlak Author List Ciarán Bryce, Michel Deriaz, Michel Pawlak,... Workpackage Number WP 4

More information

Software Engineering. So(ware Evolu1on

Software Engineering. So(ware Evolu1on Software Engineering So(ware Evolu1on 1 Software change Software change is inevitable New requirements emerge when the software is used; The business environment changes; Errors must be repaired; New computers

More information

Assurance of Open Source Projects

Assurance of Open Source Projects Assurance of Open Source Projects Dr Graham Oakes Founder and Principal, Graham Oakes Ltd Contents The value of Open Source Software (OSS) Two types of OSS project The challenges of implementing OSS systems

More information

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)

More information

Zend Server 4.0 Beta 2 Release Announcement What s new in Zend Server 4.0 Beta 2 Updates and Improvements Resolved Issues Installation Issues

Zend Server 4.0 Beta 2 Release Announcement What s new in Zend Server 4.0 Beta 2 Updates and Improvements Resolved Issues Installation Issues Zend Server 4.0 Beta 2 Release Announcement Thank you for your participation in the Zend Server 4.0 beta program. Your involvement will help us ensure we best address your needs and deliver even higher

More information

APPENDIX 1 A STUDY ON EXPLORING THE IMPACT OF RELEASE MANAGEMENT TO ENHANCE THE QUALITY OF OPEN SOURCE SOFTWARE PROJECT MANAGEMENT

APPENDIX 1 A STUDY ON EXPLORING THE IMPACT OF RELEASE MANAGEMENT TO ENHANCE THE QUALITY OF OPEN SOURCE SOFTWARE PROJECT MANAGEMENT 177 APPENDIX 1 A STUDY ON EXPLORING THE IMPACT OF RELEASE MANAGEMENT TO ENHANCE THE QUALITY OF OPEN SOURCE SOFTWARE PROJECT MANAGEMENT QUESTIONNAIRE I. Personal and Socio-Economic Profile 1. Located in:

More information

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,

More information

Distributed File Systems

Distributed File Systems Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.

More information

Towards Trusted Semantic Service Computing

Towards Trusted Semantic Service Computing Towards Trusted Semantic Service Computing Michel Deriaz University of Geneva, Switzerland Abstract. This paper describes a new prototype of a semantic Service Oriented Architecture (SOA) called Spec Services.

More information

Hadoop and Map-Reduce. Swati Gore

Hadoop and Map-Reduce. Swati Gore Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data

More information

OW2 migration to Xsalto

OW2 migration to Xsalto OW2 migration to Xsalto 10 th july 2007 Armel Lannois Table of Content ObjectWeb architecture overview Actual OW2 Servers overview Problems Opportunities OW2 architecture Migration plan Tasks 2 ObjectWeb

More information

Universidad Simón Bolívar

Universidad Simón Bolívar Cardinale, Yudith Figueira, Carlos Hernández, Emilio Baquero, Eduardo Berbín, Luis Bouza, Roberto Gamess, Eric García, Pedro Universidad Simón Bolívar In 1999, a couple of projects from USB received funding

More information

Programmable Networking with Open vswitch

Programmable Networking with Open vswitch Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads

More information

Process Improvement. Process improvement. Process improvement stages. Understanding, Modelling and Improving the Software Process

Process Improvement. Process improvement. Process improvement stages. Understanding, Modelling and Improving the Software Process Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes

More information

Chapter 11 Map-Reduce, Hadoop, HDFS, Hbase, MongoDB, Apache HIVE, and Related

Chapter 11 Map-Reduce, Hadoop, HDFS, Hbase, MongoDB, Apache HIVE, and Related Chapter 11 Map-Reduce, Hadoop, HDFS, Hbase, MongoDB, Apache HIVE, and Related Summary Xiangzhe Li Nowadays, there are more and more data everyday about everything. For instance, here are some of the astonishing

More information

Open source business rules management system

Open source business rules management system JBoss Enterprise BRMS Open source business rules management system What is it? JBoss Enterprise BRMS is an open source business rules management system that enables easy business policy and rules development,

More information

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1 The Role of Programming in Informatics Curricula A. J. Cowling Department of Computer Science University of Sheffield Structure of Presentation Introduction The problem, and the key concepts. Dimensions

More information

HDFS Users Guide. Table of contents

HDFS Users Guide. Table of contents Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9

More information

RoverPal - A Mobile Payment Application

RoverPal - A Mobile Payment Application White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run

More information

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1 Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components

More information

DreamFactory Security Whitepaper Customer Information about Privacy and Security

DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory

More information

UBS Training Course Catalog

UBS Training Course Catalog 2014 COURSE CATALOG SECURITY COURSES Advanced Ethical Hacking Secure Android Development Secure ios Development C/C++ Programming Security Complete Windows Security Cryptography Overview Designing Secure

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

Cross platform Migration of SAS BI Environment: Tips and Tricks

Cross platform Migration of SAS BI Environment: Tips and Tricks ABSTRACT Cross platform Migration of SAS BI Environment: Tips and Tricks Amol Deshmukh, California ISO Corporation, Folsom, CA As a part of organization wide initiative to replace Solaris based UNIX servers

More information

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document

More information

How To Use The Dcml Framework

How To Use The Dcml Framework DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application

More information

Operating Systems 4 th Class

Operating Systems 4 th Class Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science

More information

Prepared By : Manoj Kumar Joshi & Vikas Sawhney

Prepared By : Manoj Kumar Joshi & Vikas Sawhney Prepared By : Manoj Kumar Joshi & Vikas Sawhney General Agenda Introduction to Hadoop Architecture Acknowledgement Thanks to all the authors who left their selfexplanatory images on the internet. Thanks

More information

ESB Features Comparison

ESB Features Comparison ESB Features Comparison Feature wise comparison of Mule ESB & Fiorano ESB Table of Contents A note on Open Source Software (OSS) tools for SOA Implementations... 3 How Mule ESB compares with Fiorano ESB...

More information

Components of a Computer System

Components of a Computer System SFWR ENG 3B04 Software Design III 1.1 3 Hardware Processor(s) Memory I/O devices Operating system Kernel System programs Components of a Computer System Application programs Users SFWR ENG 3B04 Software

More information

Local Area Networks: Software and Support Systems

Local Area Networks: Software and Support Systems Local Area Networks: Software and Support Systems Chapter 8 Learning Objectives After reading this chapter, you should be able to: Identify the main functions of operating systems and network operating

More information

Datavetenskapligt Program (kandidat) Computer Science Programme (master)

Datavetenskapligt Program (kandidat) Computer Science Programme (master) Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer

More information

Oracle SOA Suite/B2B as a Critical Mission Hub for a High Volume Message Use Case

Oracle SOA Suite/B2B as a Critical Mission Hub for a High Volume Message Use Case Oracle SOA Suite/B2B as a Critical Mission Hub for a High Volume Message Use Case Introduction Stop. Think. Ok, in the meanwhile 2 seconds has passed and 250 messages more were processed by a mission critical

More information

Using Tableau Software with Hortonworks Data Platform

Using Tableau Software with Hortonworks Data Platform Using Tableau Software with Hortonworks Data Platform September 2013 2013 Hortonworks Inc. http:// Modern businesses need to manage vast amounts of data, and in many cases they have accumulated this data

More information

Software Project Measurement

Software Project Measurement Software Project Measurement We can t accurately measure software, yet we must have measures if we are to understand large-scale design. This lecture discusses: the practical aims of measurement; the measures

More information

Big Data Trends and HDFS Evolution

Big Data Trends and HDFS Evolution Big Data Trends and HDFS Evolution Sanjay Radia Founder & Architect Hortonworks Inc Page 1 Hello Founder, Hortonworks Part of the Hadoop team at Yahoo! since 2007 Chief Architect of Hadoop Core at Yahoo!

More information

LECTURES NOTES Organisational Aspects of Software Development

LECTURES NOTES Organisational Aspects of Software Development LECTURES NOTES Organisational Aspects of Software Development Pedro Contreras Department of Computer Science Royal Holloway, University of London Egham, Surrey TW20 0EX, UK pedro@cs.rhul.ac.uk 1. Introduction

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned

More information

Client Overview. Engagement Situation

Client Overview. Engagement Situation Client Overview Our client is a provider of Operational Analytics and Visualization solutions for cloud/datacenters that enables IT function of an organization to monitor, and plan complex cloud and data

More information

An Introduction to Software Development Process and Collaborative Work

An Introduction to Software Development Process and Collaborative Work Organisational Aspects of Software Development Pedro Contreras Department of Computer Science Royal Holloway, University of London January 29, 2008 Introduction Creating software is a complex task. Organising

More information

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates

More information

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information

More information

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance

More information

Navigate Your Way to PCI DSS Compliance

Navigate Your Way to PCI DSS Compliance Whitepaper Navigate Your Way to PCI DSS Compliance The Payment Card Industry Data Security Standard (PCI DSS) is a series of IT security standards that credit card companies must employ to protect cardholder

More information

GETTING STARTED WITH MANAGED SERVICES

GETTING STARTED WITH MANAGED SERVICES GETTING STARTED WITH MANAGED SERVICES There are basic aspects of I.T. that true managed service providers should be taking into consideration when providing services to companies. Our checklist should

More information

Driving workload automation across the enterprise

Driving workload automation across the enterprise IBM Software Thought Leadership White Paper October 2011 Driving workload automation across the enterprise Simplifying workload management in heterogeneous environments 2 Driving workload automation across

More information

Construction of SaaS-Based e-learning System in Japan

Construction of SaaS-Based e-learning System in Japan Construction of SaaS-Based e-learning System in Japan Norihiko Sakamoto (Manuscript received January 30, 2009) Fujitsu s electronic learning (e-learning) application began to be offered in Japan in the

More information

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac. ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

System Structures. Services Interface Structure

System Structures. Services Interface Structure System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface

More information

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing

More information

Performance Monitoring and Analysis System for MUSCLE-based Applications

Performance Monitoring and Analysis System for MUSCLE-based Applications Polish Infrastructure for Supporting Computational Science in the European Research Space Performance Monitoring and Analysis System for MUSCLE-based Applications W. Funika, M. Janczykowski, K. Jopek,

More information

White Paper. Software Development Best Practices: Enterprise Code Portal

White Paper. Software Development Best Practices: Enterprise Code Portal White Paper Software Development Best Practices: Enterprise Code Portal An Enterprise Code Portal is an inside the firewall software solution that enables enterprise software development organizations

More information

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating

More information

Organisation data architecture with standards connections

Organisation data architecture with standards connections Organisation data architecture with standards connections Arthur Haynes Principal Data Architect Siemens Business Services (formerly BBC Technology) Providing a Data Integration Service!Enable a Media

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case) 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information

More information

x86 ISA Modifications to support Virtual Machines

x86 ISA Modifications to support Virtual Machines x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization

More information

Fundamentals of Information Governance:

Fundamentals of Information Governance: Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different

More information

Linux Distributions. What they are, how they work, which one to choose. avix@br.ibm.com> +55-11-2132-2327. Avi Alkalay <avix@br.ibm.

Linux Distributions. What they are, how they work, which one to choose. avix@br.ibm.com> +55-11-2132-2327. Avi Alkalay <avix@br.ibm. Linux Distributions What they are, how they work, which one to choose Avi Alkalay +55-11-2132-2327 Linux, Open Standards Consultant IBM Corporation Before You Start...

More information

A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers

A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers A Project Summary: VMware ESX Server to Facilitate: Infrastructure Management Services Server Consolidation Storage & Testing with Production Servers Srinivas P Reddy - 16 th March 2006 srinivasp@vensoft.com

More information

Use service virtualization to remove testing bottlenecks

Use service virtualization to remove testing bottlenecks Use service virtualization to remove testing bottlenecks Discover integration faults early by pushing integration testing left in the software lifecycle Contents 1 Complex, interconnected applications

More information

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk

More information

Chapter 11 Distributed File Systems. Distributed File Systems

Chapter 11 Distributed File Systems. Distributed File Systems Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file

More information

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents

More information

What is virtualization

What is virtualization Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them

More information

BusinessObjects XI R2 Product Documentation Roadmap

BusinessObjects XI R2 Product Documentation Roadmap XI R2 Product Documentation Roadmap XI R2 indows and UNIX Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents, which may cover products that are offered

More information

SCALABLE DATA SERVICES

SCALABLE DATA SERVICES 1 SCALABLE DATA SERVICES 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview MySQL Database Clustering GlusterFS Memcached 3 Overview Problems of Data Services 4 Data retrieval

More information

Application Architectures

Application Architectures Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch

More information

JAVA WEB START OVERVIEW

JAVA WEB START OVERVIEW JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start

More information

Oracle Business Activity Monitoring 11g New Features

Oracle Business Activity Monitoring 11g New Features Oracle Business Activity Monitoring 11g New Features Gert Schüßler Principal Sales Consultant Oracle Deutschland GmbH Agenda Overview Architecture Enterprise Integration Framework

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

<Insert Picture Here> Private Cloud with Fusion Middleware

<Insert Picture Here> Private Cloud with Fusion Middleware Private Cloud with Fusion Middleware Duško Vukmanović Principal Sales Consultant, Oracle dusko.vukmanovic@oracle.com The following is intended to outline our general product direction.

More information

OSGi Remote Management

OSGi Remote Management OSGi Remote Management INCREASE OUR Date 20-11-2006 Miguel García Longarón - mgl@tid.es Present situation OSGi is being applied in several domains Each domain has own solution for remote management Home

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

The IBM data governance blueprint: Leveraging best practices and proven technologies

The IBM data governance blueprint: Leveraging best practices and proven technologies May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and

More information

Virtualization s Evolution

Virtualization s Evolution Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,

More information

12. Introduction to Virtual Machines

12. Introduction to Virtual Machines 12. Introduction to Virtual Machines 12. Introduction to Virtual Machines Modern Applications Challenges of Virtual Machine Monitors Historical Perspective Classification 332 / 352 12. Introduction to

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

Augmented Search for Software Testing

Augmented Search for Software Testing Augmented Search for Software Testing For Testers, Developers, and QA Managers New frontier in big log data analysis and application intelligence Business white paper May 2015 During software testing cycles,

More information

GECKO Software. Introducing FACTORY SCHEMES. Adaptable software factory Patterns

GECKO Software. Introducing FACTORY SCHEMES. Adaptable software factory Patterns Introducing FACTORY SCHEMES Adaptable software factory Patterns FACTORY SCHEMES 3 Standard Edition Community & Enterprise Key Benefits and Features GECKO Software http://consulting.bygecko.com Email: Info@gecko.fr

More information

How To Understand The History Of The Web (Web)

How To Understand The History Of The Web (Web) (World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL

More information

Multi-core Programming System Overview

Multi-core Programming System Overview Multi-core Programming System Overview Based on slides from Intel Software College and Multi-Core Programming increasing performance through software multi-threading by Shameem Akhter and Jason Roberts,

More information

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Technical Note Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Certificates are automatically generated when you install vcenter Server and ESX/ESXi. These default certificates are not signed

More information

Basic Unix/Linux 1. Software Testing Interview Prep

Basic Unix/Linux 1. Software Testing Interview Prep Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a

More information

Developing SOA solutions using IBM SOA Foundation

Developing SOA solutions using IBM SOA Foundation Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this

More information

Trustworthy Computing

Trustworthy Computing Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with

More information

Cloud Data Protection for the Masses

Cloud Data Protection for the Masses Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing

More information

Shared Services Canada. Cloud Computing

Shared Services Canada. Cloud Computing Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks

More information

Restraining Execution Environments

Restraining Execution Environments Restraining Execution Environments Segurança em Sistemas Informáticos André Gonçalves Contents Overview Java Virtual Machine: Overview The Basic Parts Security Sandbox Mechanisms Sandbox Memory Native

More information

An InControl Technology White Paper

An InControl Technology White Paper An InControl Technology White Paper Defining Asset Intelligence and the evolution from IT inventory InControl Technology, Inc. 4025 Camino Del Rio South, Suite 300 San Diego, CA 92108 Phone: (1) 619.542.7732

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

OPERATING SYSTEM SERVICES

OPERATING SYSTEM SERVICES OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered

More information